Splunk Search

Why does my autolookup definition produce unexpected results with different search strings?

Builder

I am having an odd issue. I created an autolookup definition that seems to be working under certain circumstances. Other times it either doesn't work as I expect or works horribly inefficiently.

Lookup contains a mapping column from an auto extracted field with other columns for Country, City, CallCenter.

The search below works just fine.
index=app
host=host*
source="sourcefile*"
sourcetype=sourctypeX
|top Country

will return a row with Philippines 97634

This is where things get odd. If you click the Philippines link in the results to view events it generates the following search which returns nothing.
index=app
host="host*"
source="sourcefile*"
sourcetype=sourctypeX
Country=Philippines

It gets weirder as well adding a wildcard after the Country finds a small subset of the first search, in this case a single event
index=app
host=host*
source="sourcefile*"
sourcetype=sourctypeX
Country=Philippines*

What is going on here? Why can't I do a search for:

index=app
host=host*
source="sourcefile*"
sourcetype=sourctypeX
Country=Phillipines
|timechart count by CallCenter

0 Karma

Motivator

Hello! Did your verify the time range? Set it to all time and let me know
Thanks

0 Karma

Builder

All example searches were done for a 5 minute range.

0 Karma

Motivator

I want to say, when you click the Philippines link in the results to view events, change the time range of the search in the search bar to all time and let me know.
If still not working, make sure that, your lookup table and lookup definition are shared globally.

0 Karma
State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!